Results 41 to 50 of about 2,276 (160)
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years,
Adamu Abdullahi +4 more
doaj
Categorization of CoAP DoS Attack Based on One-Class Boundary Methods [PDF]
Míriam Timiraos +8 more
openalex +1 more source
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni +2 more
wiley +1 more source
Models2Code: Autonomous model‐based generation to expedite the engineering process
Abstract Insufficient resources and high costs are hindering industrial development, potentially impeding adaptation to market demands. Overcoming this challenge necessitates advancements in software engineering techniques to streamline processes and meet industrial requirements. Crucially, automating manual tasks and enhancing interoperability between
Cristina Paniagua, Fernando Labra Caso
wiley +1 more source
A Thorough Review of Security in Information‐Centric Networking
The rapid evolution of technology has revealed the limitations of host‐centric or IP address–based networks. To overcome these limitations, a new communication paradigm has emerged: the information‐centric networking (ICN), which focuses on content (data) regardless of its location in the network.
Ado Adamou Abba Ari +7 more
wiley +1 more source
Background Pectus excavatum (PE), a congenital deformity of the chest wall, can lead to cardiac compression and related symptoms. PE surgical repair can improve cardiac function. Intraoperative transesophageal echocardiography (TEE) has been successfully
Silvia Fiorelli +11 more
doaj +1 more source
The industrial Internet of Things (IIoT) has become an innovative technology that has brought many benefits to industries and organizations. This review presents a comprehensive analysis of IIoT’s applications, highlighting its ability to optimize industrial operations through advanced connectivity, real‐time data exchange, automation, and its ...
Fujun Qiu +7 more
wiley +1 more source
The efficiency requirement of room air conditioner (RAC) has became stricter and stricter with the development of global environment consciousness.
Zhang Haifeng, Wu Jianhua, Li Yanzhong
doaj
Variance‐driven security optimisation in industrial IoT sensors
The methodology employed in this study adopts a systematic approach to deploying machine learning algorithms for the detection of anomalies in industrial sensor data. Data preprocessing, the first step in the process, ensures that the industrial sensor data is cleaned and prepared for subsequent model training.
Hardik Gupta +7 more
wiley +1 more source
In this paper we present the design and implementation of the Constrained Application Protocol (CoAP) for TinyOS, which we refer to as TinyCoAP. CoAP seeks to apply the same application transfer paradigm and basic features of HTTP to constrained networks,
Anna Calveras +2 more
doaj +1 more source

